Browse Source

checkpoint: fold in changes files

Roger Dingledine 12 years ago
parent
commit
d5bb0d7789

+ 88 - 0
ChangeLog

@@ -1,3 +1,91 @@
+Changes in version 0.2.3.6-alpha - 2011-10-??
+  o Major features:
+    - Implement a new handshake protocol for authenticating Tors to
+      each other over TLS. It should be more resistant to fingerprinting
+      than previous protocols, and should require less TLS hacking for
+      future Tor implementations. Implements Proposal 185.
+    - Allow variable-length padding cells to disguise the length of
+      Tor's TLS records. Implements part of Proposal 184.
+
+  o Major bugfixes (hidden services):
+    - Don't launch a useless circuit after failing to use one of a
+      hidden service's introduction points. Previously, we would
+      launch a new introduction circuit, but not set the hidden service
+      which that circuit was intended to connect to, so it would never
+      actually be used. A different piece of code would then create a
+      new introduction circuit correctly, so this bug was harmless until
+      it caused an assertion in the client-side part of the #3825 fix
+      to fail. Bug reported by katmagic and found by Sebastian Hahn.
+      Bugfix on 0.2.1.13-alpha; fixes bug 4212.
+    - When one of a hidden service's introduction points appears to be
+      unreachable, stop trying it. Previously, we would keep trying
+      to build circuits to the introduction point until we lost the
+      descriptor, usually because the user gave up and restarted Tor.
+      Partly fixes bug 3825.
+    - When an attempt to connect to a hidden service ends, consider
+      refetching its hidden service descriptors from each of the HSDir
+      relays responsible for them immediately. Previously, we would not
+      consider refetching the service's descriptors from each HSDir for
+      15 minutes after the last fetch; this behaviour was inconvenient
+      if the hidden service was not running during the first attempt,
+      for example. Bugfix on 0.2.0.18-alpha; fixes bug 3335.
+
+  o Major bugfixes (other):
+    - Don't update the AccountingSoftLimitHitAt state file entry whenever
+      tor gets started. This prevents a wrong average bandwidth
+      estimate, which would cause relays to always start a new accounting
+      interval at the earliest possible moment. Fixes bug 2003; bugfix
+      on 0.2.2.7-alpha.  Reported by BryonEldridge, who also helped
+      immensely in tracking this bug down.
+    - Fix a crash bug when changing node restrictions while a DNS lookup
+      is in-progress. Fixes bug 4259; bugfix on 0.2.2.25-alpha. Bugfix
+      by "Tey'".
+
+  o Minor bugfixes (on 0.2.3.x):
+    - Fix a bug in configure.in that kept it from building a configure
+      script with autoconf versions earlier than 2.61. Fixes bug 2430;
+      bugfix on 0.2.3.1-alpha.
+    - Don't warn users that they are exposing a client port to the
+      Internet if they have specified an RFC1918 address. Previously,
+      we would warn if the user had specified any non-loopback
+      address. Bugfix on 0.2.3.3-alpha. Fixes bug 4018; reported by Tas.
+
+  o Minor bugfixes (on 0.2.2.x and earlier):
+    - When one of a hidden service's introduction points times out,
+      consider trying it again during the next attempt to connect to
+      the HS. Previously, we would not try it again unless a newly
+      fetched descriptor contained it. Required by fixes for bugs
+      1297 and 3825.
+    - Rephrase the log message emitted if the TestSocks check is
+      successful. Patch from Fabian Keil; fixes bug 4094.
+    - Bridges now skip DNS self-tests, to act a little more stealthily.
+      Fixes bug 4201; bugfix on 0.2.0.3-alpha, which first introduced
+      bridges. Patch by "warms0x".
+    - When a hidden service turns an extra service-side introduction
+      circuit into a general-purpose circuit, free the rend_data and
+      intro_key fields first, so we won't leak memory if the circuit
+      is cannibalized for use as another service-side introduction
+      circuit. Bugfix on 0.2.1.7-alpha; fixes bug 4251.
+
+  o Minor features:
+    - The next version of Windows will be called Windows 8, and it has
+      a major version of 6, minor version of 2. Correctly identify that
+      version instead of calling it "Very recent version". Resolves
+      ticket 4153; reported by funkstar.
+    - The bridge authority now writes statistics on how many bridge
+      descriptors it gave out in total, and how many unique descriptors
+      it gave out. Implements ticket 4200.
+    - Update to the October 4 2011 Maxmind GeoLite Country database.
+
+  o Code simplifications and refactoring:
+    - Remove the ability to define TRACK_SERVED_TIME. The feature
+      wasn't used and is now outdated that microdescriptors are around.
+    - Rename Tor functions that turn strings into addresses, so that
+      "parse" indicates that no hostname resolution occurs, and
+      "lookup" indicates that hostname resolution may occur. This
+      should help prevent mistakes in the future. Fixes bug 3512.
+
+
 Changes in version 0.2.3.5-alpha - 2011-09-28
   Tor 0.2.3.5-alpha fixes two bugs that make it possible to enumerate
   bridge relays; fixes an assertion error that many users started hitting

+ 0 - 8
changes/bug1297b

@@ -1,8 +0,0 @@
-  o Minor bugfixes:
-
-    - When one of a hidden service's introduction points times out,
-      consider trying it again during the next attempt to connect to
-      the HS.  Previously, we would not try it again unless a newly
-      fetched descriptor contained it.  Required by fixes for bugs
-      1297 and 3825.
-

+ 0 - 8
changes/bug2003

@@ -1,8 +0,0 @@
-  o Major bugfixes:
-    - Don't update the AccountingSoftLimitHitAt state file entry whenever
-      tor gets started. This prevents a wrong average bandwidth estimate,
-      which would cause relays to always start a new accounting interval at
-      the earliest possible moment. Fixes bug 2003; bugfix on 0.2.2.7-alpha.
-      Reported by BryonEldridge, who also helped immensely in tracking this
-      bug down. Thanks!
-

+ 0 - 4
changes/bug2430

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Fix a bug in configure.in that kept it from building a configure
-      script with autoconf versions earlier than 2.61. Fixes bug 2430;
-      bugfix on 0.2.3.1-alpha.

+ 0 - 11
changes/bug3335

@@ -1,11 +0,0 @@
-  o Major bugfixes:
-
-    - When an attempt to connect to a hidden service ends, consider
-      refetching its hidden service descriptors from each of the HSDir
-      relays responsible for them immediately.  Previously, we would
-      not consider refetching the service's descriptors from each
-      HSDir for 15 minutes after the last fetch; this behaviour was
-      inconvenient if the hidden service was not running during the
-      first attempt, for example.  Bugfix on 0.2.0.18-alpha; fixes bug
-      3335.
-

+ 0 - 6
changes/bug3512

@@ -1,6 +0,0 @@
-  o Code simplifications and refactoring:
-    - Rename Tor functions that turn strings into addresses, so that
-      "parse" indicates that no hostname resolution occurs, and
-      "lookup" indicates that hostname resolution may occur. This
-      should help prevent mistakes in the future. Fixes bug 3512.
-

+ 0 - 8
changes/bug3825a

@@ -1,8 +0,0 @@
-  o Major bugfixes:
-
-    - When one of a hidden service's introduction points appears to be
-      unreachable, stop trying it.  Previously, we would keep trying
-      to build circuits to the introduction point until we lost the
-      descriptor, usually because the user gave up and restarted Tor.
-      Partly fixes bug 3825.
-

+ 0 - 3
changes/bug4094

@@ -1,3 +0,0 @@
-  o Minor bugfixes:
-    - Rephrase the log message emitted if the TestSocks check is
-      successful. Patch from Fabian Keil; fixes bug 4094.

+ 0 - 5
changes/bug4201

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Bridges now skip DNS self-tests, to act a little more stealthily.
-      Fixes bug 4201; bugfix on 0.2.0.3-alpha, which first introduced
-      bridges. Patch by "warms0x".
-

+ 0 - 13
changes/bug4212

@@ -1,13 +0,0 @@
-  o Major bugfixes:
-
-    - Don't launch a useless circuit after failing to use one of a
-      hidden service's introduction points.  Previously, we would
-      launch a new introduction circuit, but not set the hidden
-      service which that circuit was intended to connect to, so it
-      would never actually be used.  A different piece of code would
-      then create a new introduction circuit correctly, so this bug
-      was harmless until it caused an assertion in the client-side
-      part of the #3825 fix to fail.  Bug reported by katmagic and
-      found by Sebastian Hahn.  Bugfix on 0.2.1.13-alpha; fixes bug
-      4212.
-

+ 0 - 8
changes/bug4251

@@ -1,8 +0,0 @@
-  o Minor bugfixes:
-
-    - When a hidden service turns an extra service-side introduction
-      circuit into a general-purpose circuit, free the rend_data and
-      intro_key fields first, so they won't be leaked if the circuit
-      is cannibalized for use as another service-side introduction
-      circuit.  Bugfix on 0.2.1.7-alpha; fixes bug 4251.
-

+ 0 - 4
changes/bug4259

@@ -1,4 +0,0 @@
-  o Major bugfixes:
-    - Fix a crash bug when changing node restrictions while a DNS lookup
-      is in-progress. Fixes bug 4259; bugfix on 0.2.2.25-alpha. Bugfix
-      by "Tey'".

+ 0 - 7
changes/dont-warn-about-rfc1918-socksport-addrs

@@ -1,7 +0,0 @@
-  o Minor bugfixes:
-
-    - Don't warn users that they are exposing a client port to the
-      Internet if they have specified an RFC1918 address.  Previously,
-      we would warn if the user had specified any non-loopback
-      address.  Bugfix on 0.2.3.3-alpha.  Fixes bug 4018; reported by Tas.
-

+ 0 - 3
changes/geoip-october2011

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the October 4 2011 Maxmind GeoLite Country database.
-

+ 0 - 8
changes/prop176

@@ -1,8 +0,0 @@
-  o Major features
-    - Implement a new handshake protocol for authenticating Tors to
-      each other over TLS. It should be more resistant to fingerprinting
-      than previous protocols, and should require less TLS hacking for
-      future Tor implementations.  Implements Proposal 185.
-    - Allow variable-length padding cells to disguise the length of
-      Tor's TLS records.  Implements part of Proposal 184.
-

+ 0 - 4
changes/remove_TRACK_SERVED_TIME

@@ -1,4 +0,0 @@
-  o Removed features:
-    - Remove the ability to define TRACK_SERVED_TIME. The feature wasn't used
-      and is now outdated that microdescriptors are around.
-

+ 0 - 5
changes/ticket4200

@@ -1,5 +0,0 @@
-  o Minor features:
-    - The bridge authority now writes statistics on how many bridge
-      descriptors it gave out in total, and how many unique descriptors
-      it gave out. Implements ticket 4200.
-

+ 0 - 5
changes/windows_8

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - The next version of Windows will be called Windows 8, and it has a major
-      version of 6, minor version of 2. Correctly identify that version instead
-      of calling it "Very recent version". Fixes bug 4153; reported by funkstar.
-